A Quick Glance

  • black-arrow

    Pass the CISSP exam

  • black-arrow

    Gain vital cybersecurity skills

  • black-arrow

    Implement and manage security programs

  • black-arrow

    Prove your security expertise and knowledge

Modern businesses require proven security professionals to help them defend against threats to their data and systems. CISSP (Certified Information Systems Security Professional)-certified professionals have vast knowledge and expertise to design, implement and manage IT security systems.

Our CISSP training is designed to help learners prepare for the CISSP exam, providing a full understanding of the 8 domains of the CISSP CBK which the exam assesses and ensuring delegates are ready to pass confidently.

Who should take this course

  • Security Consultants
  • Security Managers
  • Security Analysts
  • IT Managers
  • Security Directors
  • Network Architects
  • Security Auditors
  • Security Architects
  • Security Systems Engineers
  • Chief Information Security Officers
More

Prerequisites

There are no requirements for this course, but  4-5 years of experience in at least 2 of the 8 CBK domains is required for full CISSP certification.

More

What Will You Learn

  • Prepare for the CISSP exam
  • Understand the 8 domains of the CISSP CBK
  • Understand what is expected of a cybersecurity professional
  • Learn the fundamentals of security management
More

What's included

  Course Overview

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this highly sought-after certification.

More

  Course Content

Security and Risk Management

  • Confidentiality, Integrity, and Availability Concepts
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Policies, Standards, Procedures, and Guidelines

Asset Security

  • Information and Asset Classification
  • Ownership
  • Protect Privacy
  • Appropriate Retention
  • Data Security Controls
  • Handling Requirements

Security Architecture and Engineering

  • Engineering Processes using Secure Design Principles
  • Security Models Fundamental Concepts
  • Security Evaluation Models
  • Security Capabilities of Information Systems
  • Security Architectures, Designs, and Solution Elements Vulnerabilities
  • Web-based Systems Vulnerabilities
  • Mobile Systems Vulnerabilities
  • Embedded Devices and Cyber-Physical Systems Vulnerabilities
  • Cryptography
  • Site and Facility Design Secure Principles
  • Physical Security

Communication and Network Security

  • Secure Network Architecture Design
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks

Identity and Access Management (IAM)

  • Physical and Logical Assets Control
  • Identification and Authentication of People and Devices
  • Identity as a Service
  • Third-party Identity Services
  • Access Control Attacks
  • Identity and Access Provisioning Lifecycle

Security Assessment and Testing

  • Assessment and Test Strategies
  • Security Process Data
  • Security Control Testing
  • Test Outputs
  • Security Architectures Vulnerabilities

Security Operations

  • Investigations Support and Requirements
  • Logging and Monitoring Activities
  • Provisioning of Resources
  • Foundational Security Operations Concepts
  • Resource Protection Techniques
  • Incident Management
  • Preventative Measures
  • Patch and Vulnerability Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery Processes and Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Safety Concerns

Software Development Security

  • Security in the Software Development Lifecycle
  • Development Environment Security Controls
  • Software Security Effectiveness
  • Acquired Software Security Impact
More

CISSP

What is CISSP?

CISSP is a globally approved cybersecurity qualification designed for experienced cybersecurity practitioners.

In 1988, it was recognised that a standardised cybersecurity body which provided certification for the industry was required. In 1989, ISC (International Information Security Certification Consortium) was established, with its first certification, CISSP, being launched in 1994.

CISSP takes as its basis the CBK (Common Body of Knowledge), a collection of skills, practices and techniques which any cyber expert should know in order to do their job effectively.

Our CISSP training provides delegates with the knowledge they need to prepare for the CISSP exam, including a strong understanding of the 8 CISSP domains.



CISSP Certified Information Systems Security Professional Enquiry

 

Enquire Now


----- OR -------

Reach us at +44 1344 961530 or info@pentagonit.co.uk for more information.

About Swansea

Swansea is the city of Swansea. It is the twenty-fifth central city and second main city in Wales after Cardiff in the United Kingdom. It is situated on the sandy South West Wales coast. Rendering to its local assembly, the City and County of Swansea had a populace of 241,300 in 2014. The last authorised survey stated that the city, city and urban extents joint decided to be a total of 462,000 in 2011, creating it the second greatest populous local expert area in Wales after Cardiff. During its 19th-century manufacturing heydey, Swansea was an important centre of the copper industry, making the nickname 'Copperopolis'.

 Governance:

In 1887, Swansea was a settlement at the mouth of the river Tawe, covering 4,562 acres (1,846 ha) in the county of Glamorgan. There were three major postponements to the limits of the borough, first in 1835, when Morriston, St Thomas, Landore, St John-juxta-Swansea, and part of Llansamlet parish were additional, and again in 1889 when areas around Cwmbwrla and Trewyddfa were comprised, and in 1918 when the borough was distended to comprise the whole of the antique parish of Swansea, the southern part of Llangyfelach parish, all of Llansamlet parish, Oystermouth Urban District and Brenau parish.

 Demography:

The population of the Swansea built-up area within the unitary power limits in 2011 was about 179,485, and the council population was 238,700. The other built-up areas within the unitary power are centred on Gorseinon and Pontarddulais. In 2011, the Gorseinon urbanised area had a population of 20,581, and the Pontarddulais built-up area had a population of 9,073. However, the wider urban area counting most of Swansea Bay has a total population of 300,352.

Notable People:

People from Swansea are recognised nearby as Swansea Jacks or just Jacks. The basis of this nickname is not clear. Some quality it to Swansea Jack, the life-saving dog.

Through the 19th century, the Vivian family did ample to develop Swansea into a city. Their wealth and effect originated from large copper mining, melting and interchange trades in Swansea (Vivian & Sons), and is still noticeable today in their previous family residences: Singleton Abbey, Sketty Hall, Clyne Castle and Clyne Gardens. Henry Vivian suited the first Lord Swansea in 1893.

Swansea's most well-known daughter is Hollywood actress Catherine Zeta-Jones who still possesses a home in Mumbles. Swansea is also the home town of 2013 ITU Triathlon World Champion Non-Stanford. The thriller writer, Mark Ellis was cultured in Swansea.

More